Ditemukan 2 dokumen yang sesuai dengan query
"
This research focuses on finding influence of Neutralization Technique element such as Denial of Responsibility, Denial of Injury, Denial of Victim, Condemnation of Condemner, Appeal to a Higher Loyalties, Metaphor of The Ledger, Claim of Normalcy, Denial of Negative Intent, and Claim of Relative Acceptability toward the use of pirated software in collage. These quantitative explanative research use method of survey as its data collecting method. The result of this research show correlation and influence ...
"
Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2010
pdf
Artikel Jurnal Universitas Indonesia Library
Cesare, Silvio
"
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to ...
"
London: Springer, 2012
e20407717
eBooks Universitas Indonesia Library